First there was the Canada; next was France. Now there are Australian news stories like this one from Sydney's Daily Telegraph reporting that Australian Prime Minister Julia Gillard's email and the emails of as many as 10 other government ministers, including the Foreign and Defense ministers, have been successfully hacked. Thousands of emails were supposedly accessed for most of the month of February before the intrusion was stopped.

The Telegraph story says that:

 "Australian intelligence agencies were tipped off to the cyber-spy raid by US intelligence officials within the Central Intelligence Agency and the Federal Bureau of Investigation."

How the CIA and FBI found out about it wasn't reported. The Telegraph story also states that Chinese intelligence agencies were high on the list of those thought to be responsible.

This story at The Australian says that PM Gillard has been down playing the hacking. She said that the IT system compromised was "used primarily by local MPs to communicate with constituents" and that her sensitive work was done on a more secure Department of Prime Minister and Cabinet system.

The Australian also noted, however, that the government is not denying that highly sensitive material may have indeed been compromised by the attack.

Coincidentally (or maybe not), the Sydney Morning Herald ran a story yesterday concerning a report ("The Protection and Security of Electronic Information Held by Australian Government Agencies" here in PDF) by the Australian National Audit Office (ANAO) involving IT security practices at the Australian Office of Financial Management, ComSuper, Medicare Australia and the Department of the Prime Minister and Cabinet.

The ANAO discovered that around 20% of the passwords used at those organizations could be cracked in one hour using "brute force" password approaches. This number wasn't considered terribly bad; however, what did raise ANAO's concerns was that:

"... in three of the four agencies audited, the test compromised some administrator and/or service account passwords. As outlined above, these types of accounts have a high level of access to agencies’ ICT [Information and Communication Technology] systems. If an attacker managed to gain access to an agency ICT system by cracking an administrator or service account password, there could be serious consequences for that agency’s security."

In light of the ANAO report, the PM's assurance of using a secure IT system probably needs to be taken with a grain of salt.

The Conversation (0)

Why the Internet Needs the InterPlanetary File System

Peer-to-peer file sharing would make the Internet far more efficient

12 min read
Horizontal
An illustration of a series
Carl De Torres
LightBlue

When the COVID-19 pandemic erupted in early 2020, the world made an unprecedented shift to remote work. As a precaution, some Internet providers scaled back service levels temporarily, although that probably wasn’t necessary for countries in Asia, Europe, and North America, which were generally able to cope with the surge in demand caused by people teleworking (and binge-watching Netflix). That’s because most of their networks were overprovisioned, with more capacity than they usually need. But in countries without the same level of investment in network infrastructure, the picture was less rosy: Internet service providers (ISPs) in South Africa and Venezuela, for instance, reported significant strain.

But is overprovisioning the only way to ensure resilience? We don’t think so. To understand the alternative approach we’re championing, though, you first need to recall how the Internet works.

Keep Reading ↓Show less